Month End Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Note! Following 156-215.77 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

156-215.77 Exam Dumps - Check Point Certified Security Administrator

Go to page:
Question # 49

Which rules are not applied on a first-match basis?

A.

User Authentication

B.

Client Authentication

C.

Session Authentication

D.

Cleanup

Full Access
Question # 50

You are running a R77 Security Gateway on GAiA. In case of a hardware failure, you have a server with the exact same hardware and firewall version installed. What back up method could be used to quickly put the secondary firewall into production?

A.

manual backup

B.

upgrade_export

C.

backup

D.

snapshot

Full Access
Question # 51

Which operating systems are supported by a Check Point Security Gateway on an open server? Select MOST complete list.

A.

Sun Solaris, Red Hat Enterprise Linux, Check Point SecurePlatform, IPSO, Microsoft Windows

B.

Check Point GAiA and SecurePlatform, and Microsoft Windows

C.

Check Point GAiA, Microsoft Windows, Red Hat Enterprise Linux, Sun Solaris, IPSO

D.

Check Point GAiA and SecurePlatform, IPSO, Sun Solaris, Microsoft Windows

Full Access
Question # 52

How granular may an administrator filter an Access Role with identity awareness? Per:

A.

Specific ICA Certificate

B.

AD User

C.

Radius Group

D.

Windows Domain

Full Access
Question # 53

What happens if the identity of a user is known?

A.

If the user credentials do not match an Access Role, the system displays the Captive Portal.

B.

If the user credentials do not match an Access Role, the system displays a sandbox.

C.

If the user credentials do not match an Access Role, the traffic is automatically dropped.

D.

If the user credentials match an Access Role, the rule is applied and traffic is accepted or dropped based on the defined action.

Full Access
Question # 54

Which rule position in the Rule Base should hold the Cleanup Rule? Why?

A.

First. It explicitly accepts otherwise dropped traffic.

B.

Last. It explicitly drops otherwise accepted traffic.

C.

Last. It serves a logging function before the implicit drop.

D.

Before last followed by the Stealth Rule.

Full Access
Question # 55

What command with appropriate switches would you use to test Identity Awareness connectivity?

A.

test_ldap

B.

test_ad_connectivity

C.

test_ldap_connectivity

D.

test_ad

Full Access
Question # 56

Which item below in a Security Policy would be enforced first?

A.

IP spoofing/IP options

B.

Security Policy First rule

C.

Administrator-defined Rule Base

D.

Network Address Translation

Full Access
Go to page: